Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe
Resource
win10v2004-20241007-en
General
-
Target
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe
-
Size
522KB
-
MD5
63679ec16eaf67c3f955f377eeec72c5
-
SHA1
d10b999f4b7c20e174248a1802bcc8eb7a5acaba
-
SHA256
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8
-
SHA512
69742d2d56f3796b00397c02e9d8d8a7c8a5a678b255920f69316be330bcd9c58f7d92ff47080f2a4b48f778d45784ce498f61ff53ac37eb90f77657ac75e409
-
SSDEEP
12288:BMr7y90u4IKiurRAxhmmQAJ32bkMfaa7:SyGD6xcNAJ32bkMyS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr594540.exe healer behavioral1/memory/2708-15-0x0000000000B80000-0x0000000000B8A000-memory.dmp healer -
Healer family
-
Processes:
jr594540.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr594540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr594540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr594540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr594540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr594540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr594540.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1448-22-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/1448-24-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/1448-28-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-38-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-88-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-86-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-84-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-82-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-78-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-76-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-74-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-72-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-70-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-68-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-66-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-64-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-62-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-60-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-58-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-56-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-52-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-51-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-48-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-46-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-44-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-42-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-40-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-36-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-34-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-32-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-30-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-80-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-54-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-26-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1448-25-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziZh9875.exejr594540.exeku649606.exepid process 1920 ziZh9875.exe 2708 jr594540.exe 1448 ku649606.exe -
Processes:
jr594540.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr594540.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exeziZh9875.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZh9875.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziZh9875.exeku649606.exe02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZh9875.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku649606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr594540.exepid process 2708 jr594540.exe 2708 jr594540.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr594540.exeku649606.exedescription pid process Token: SeDebugPrivilege 2708 jr594540.exe Token: SeDebugPrivilege 1448 ku649606.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exeziZh9875.exedescription pid process target process PID 2268 wrote to memory of 1920 2268 02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe ziZh9875.exe PID 2268 wrote to memory of 1920 2268 02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe ziZh9875.exe PID 2268 wrote to memory of 1920 2268 02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe ziZh9875.exe PID 1920 wrote to memory of 2708 1920 ziZh9875.exe jr594540.exe PID 1920 wrote to memory of 2708 1920 ziZh9875.exe jr594540.exe PID 1920 wrote to memory of 1448 1920 ziZh9875.exe ku649606.exe PID 1920 wrote to memory of 1448 1920 ziZh9875.exe ku649606.exe PID 1920 wrote to memory of 1448 1920 ziZh9875.exe ku649606.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe"C:\Users\Admin\AppData\Local\Temp\02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZh9875.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZh9875.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr594540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr594540.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku649606.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku649606.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1448
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD59e72497df8e873d3ddb3320bb51d2972
SHA105af2e57ee2a3c57bae5f8901655b57bfb72ddb8
SHA2567a72b7666536f38797acfa00756975b77a9f71d33cb1a2bfafbc077bddb20eaf
SHA512f59e6531989f6691d1c70ca5d3ed0bf82dbf3c6b70f3714a53c0bed0a4953052a57b5d986779aa91112d79a3ac9ff827a0829df48769351257066c76455b9222
-
Filesize
14KB
MD5ba7bd7ad9680636c991bb692e77c7fdf
SHA11a55ab7236f49530f68229cccce47445deac3898
SHA25699f2b6197401328ea9e317eebba0c79cc291e4fdbdde8a73691d9e42936f80a7
SHA512f68b3b7b76701132098bcb1a2b1ec7e624c7313062c8d060eaa8f60b84a74b1a8f1ca2a90f2258dbd95e1de83a17fcc16cebe09a1aa548bec00fe919332a94c0
-
Filesize
295KB
MD5639d9ca18187b494ca8dac10c3780221
SHA1f54c6170437c0cac18fdf647fb2018258dcef678
SHA2569379364629d3fde0b3a38456802d5567508ecaa79bf3fc4675b0bce5d6991296
SHA5121417c38417a165a6f24266aff38bdeb46d2a2c8970ac9c40a62f99794bf145afa573537ab344f68a7ac660bef4eac5d5428f6045cbf9505afdba73f1ceecc018